Attachment: PDF with credential theft language and invalid reply-to domain
Detects PDF attachments containing high-confidence credential theft language that references the recipient's email address, combined with an invalid reply-to domain header.
Sublime rule (View on GitHub)
1name: "Attachment: PDF with credential theft language and invalid reply-to domain"
2description: "Detects PDF attachments containing high-confidence credential theft language that references the recipient's email address, combined with an invalid reply-to domain header."
3type: "rule"
4severity: "medium"
5source: |
6 type.inbound
7 and length(recipients.to) == 1
8 and recipients.to[0].email.domain.valid
9 and any(headers.reply_to, .email.email == "")
10 and any(attachments,
11 .file_type == 'pdf'
12 and any(file.explode(.),
13 any(ml.nlu_classifier(.scan.strings.raw).intents,
14 .name == 'cred_theft' and .confidence == 'high'
15 )
16 and strings.icontains(.scan.strings.raw,
17 recipients.to[0].email.email
18 )
19 )
20 )
21 // negate highly trusted sender domains unless they fail DMARC authentication or DMARC is missing
22 and not (
23 sender.email.domain.root_domain in $high_trust_sender_root_domains
24 and coalesce(headers.auth_summary.dmarc.pass, false)
25 )
26attack_types:
27 - "Credential Phishing"
28tactics_and_techniques:
29 - "PDF"
30 - "Social engineering"
31 - "Spoofing"
32detection_methods:
33 - "File analysis"
34 - "Header analysis"
35 - "Natural Language Understanding"
36 - "Content analysis"
37id: "52e54b5d-940f-5b54-b175-0a55f2a44fa2"